Kiran Pachlasiya

@pimrbhopal.ac.in

Assistant Professor CSE



                 

https://researchid.co/kiranpachlasiya

Kiran Pachlasiya having 10+ year of experience in academics also a researcher

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Vision and Pattern Recognition, Computer Science, Computer Engineering, Artificial Intelligence

9

Scopus Publications

524

Scholar Citations

9

Scholar h-index

8

Scholar i10-index

Scopus Publications

  • Quantum technology for military applications
    Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat, and Kiran Pachlasiya

    Wiley

  • Organ trafficking on the dark web-the data security and privacy concern in healthcare systems
    Romil Rawat, Bhagwati Garg, Vinod Mahor, Shrikant Telang, Kiran Pachlasiya, and Mukesh Chouhan

    Wiley

  • IoT and Artificial Intelligence Techniques for Public Safety and Security


  • Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
    Romil Rawat, Vinod Mahor, Bhagwati Garg, Mukesh Chouhan, Kiran Pachlasiya, and Shrikant Telang

    Elsevier

  • Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb
    Romil Rawat, Vinod Mahor, Mukesh Chouhan, Kiran Pachlasiya, Shrikant Telang, and Bhagwati Garg

    Springer Nature Singapore

  • Mobile Operating System (Android) Vulnerability Analysis Using Machine Learning
    Vinod Mahor, Kiran Pachlasiya, Bhagwati Garg, Mukesh Chouhan, Shrikant Telang, and Romil Rawat

    Springer Nature Singapore

  • Cyber Threat Phylogeny Assessment and Vulnerabilities Representation at Thermal Power Station
    Vinod Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Mukesh Chouhan, and Romil Rawat

    Springer Nature Singapore

  • SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches
    Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, Vinod Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, and Rina Mishra

    IGI Global
    Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: Capturing_of_Packets (CoP) and pre-processing, Reconciliation_of_Flow (RoF), and categorization of Machine Learning (ML). Based on parallel processing along with well-defined interfacing of data, the modules are framed, allowing each module to be modified and upgraded separately. The Reconciliation_of_Flow (RoF) mechanism becomes the output bottleneck in this pipeline. In this implementation, an optimal reconciliation process was used, resulting in an average delivery time of 0.62 seconds. In order to verify our method, we equated the results of the AdaBoost Ensemble Learning Algorithm (ABELA), Naive Bayes (NB), Decision Tree (DT), K-Nearest Neighbor (KNN), and Flexible Naive Bayes (FNB) in the classification module. The architectural design of the run time CSNTA categorization (flow-based) scheme is presented in this paper.

  • Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts over the Internet That Are Linked to Terrorist Activities
    Romil Rawat, Vinod Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla, and Megha Kuliha

    IGI Global
    One of the most critical activities of revealing terrorism-related information is classifying online documents.The internet provides consumers with a variety of useful knowledge, and the volume of web material is increasingly growing. This makes finding potentially hazardous records incredibly difficult. To define the contents, merely extracting keywords from records is inadequate. Many methods have been studied so far to develop automatic document classification systems, they are mainly computational and knowledge-based approaches. due to the complexities of natural languages, these approaches do not provide sufficient results. To fix this shortcoming, we given approach of structure dependent on the WordNet hierarchy and the frequency of n-gram data that employs word similarity. Using four different queries terms from four different regions, this approach was checked for the NY Times articles that were sampled. Our suggested approach successfully removes background words and phrases from the document recognizes connected to terrorism texts, according to experimental findings.

RECENT SCHOLAR PUBLICATIONS

  • Quantum technology for military applications
    S Nahar, D Pithawa, V Bhardwaj, R Rawat, A Rawat, K Pachlasiya
    Quantum Computing in Cybersecurity, 313-334 2023

  • Deep Learning Classifiers for Improving Breast Cancer Detection
    ACRS Harshita Jain, Kiran Pachlasiya
    Acta Scientific Applied Physics 3 (Issue 8 August 2023), 4 2023

  • IoT and artificial intelligence techniques for public safety and security
    V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya
    Smart urban computing applications, 111-126 2023

  • Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems
    KP Mukesh Chouhan Romil Rawat,Bhagwati Garg,Vinod Mahor,Shrikant Telang
    Internet of Healthcare Things: Machine Learning for Security and Privacy 2022

  • Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
    R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang
    Lessons from COVID-19, 405-425 2022

  • SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
    R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
    International Journal of Information Technology and Web Engineering (IJITWE 2022

  • Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities
    R Rawat, V Mahor, B Garg, S Telang, K Pachlasiya, A Kumar, SK Shukla, ...
    International Journal of Information Security and Privacy (IJISP) 16 (1), 1-14 2022

  • Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
    R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
    International Conference on Network Security and Blockchain Technology, 181-205 2022

  • 6 Cyber Threat
    R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
    Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85 2021

  • Malware Inputs Detection Approach (Tool) based on Machine Learning [MIDT-SVM]
    R Rawat, M Chouhan, B Garg, S TELANG, V Mahor, K Pachlasiya
    Available at SSRN 3915404 2021

  • Mobile Operating System (Android) Vulnerability Analysis Using Machine Learning
    V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
    International Conference on Network Security and Blockchain Technology, 159-169 2021

  • Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
    V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
    International Conference on Network Security and Blockchain Technology, 28-39 2021

  • Automated Techniques for Analyzing Cyber Threat Triggered by Terrorists and Criminals in Anonymous Space
    KP Shrikant Telang Romil Rawat, Bhagwati Garg, Vinod Mahor, Mukesh Chouhan
    https://www.elivapress.com/en/book/book-9106824963/ 2021

  • Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb (August 12, 2021)
    R Rawat, V Mahor, A Kumar, S Telang, K Pachlasiya, B Garg, M Chouhan
    AIBM-2nd International Conference on “Methods and Applications of Artificial 2021

  • Cyber Threat Exploitation and Growth during COVID-19 Times
    R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
    Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101 2021

  • Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data
    A Kumar, R Bharatpur, B Garg, R Rawat, V Mahor, S Telang, K Pachlasiya
    2021

  • User Authentication Using Image Processing Based On Lip Motion Detection
    K Pachlasiya, P Mishra
    IJCAM(ISSN 2319-9229) 4 (11 Nov 2016), 8 2016

  • Pachlasiya, & Chouhan.(2021)
    G Rawat, T Mahor
    Organ trafficking on the dark web—the data security and privacy concern in

  • Mahor.(2021)
    K Rawat, T Chouhan, G Pachlasiya
    Systematic literature review (slr) on social media and the digital

  • 19 Times
    R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, STCT Exploitation, ...
    Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101

MOST CITED SCHOLAR PUBLICATIONS

  • IoT and artificial intelligence techniques for public safety and security
    V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya
    Smart urban computing applications, 111-126 2023
    Citations: 82

  • Mobile Operating System (Android) Vulnerability Analysis Using Machine Learning
    V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
    International Conference on Network Security and Blockchain Technology, 159-169 2021
    Citations: 78

  • Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
    R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
    International Conference on Network Security and Blockchain Technology, 181-205 2022
    Citations: 77

  • Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
    V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
    International Conference on Network Security and Blockchain Technology, 28-39 2021
    Citations: 74

  • SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
    R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
    International Journal of Information Technology and Web Engineering (IJITWE 2022
    Citations: 70

  • Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems
    KP Mukesh Chouhan Romil Rawat,Bhagwati Garg,Vinod Mahor,Shrikant Telang
    Internet of Healthcare Things: Machine Learning for Security and Privacy 2022
    Citations: 67

  • Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
    R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang
    Lessons from COVID-19, 405-425 2022
    Citations: 29

  • Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities
    R Rawat, V Mahor, B Garg, S Telang, K Pachlasiya, A Kumar, SK Shukla, ...
    International Journal of Information Security and Privacy (IJISP) 16 (1), 1-14 2022
    Citations: 25

  • Cyber Threat Exploitation and Growth during COVID-19 Times
    R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
    Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101 2021
    Citations: 9

  • 19 Times
    R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, STCT Exploitation, ...
    Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101
    Citations: 3

  • Quantum technology for military applications
    S Nahar, D Pithawa, V Bhardwaj, R Rawat, A Rawat, K Pachlasiya
    Quantum Computing in Cybersecurity, 313-334 2023
    Citations: 2

  • Malware Inputs Detection Approach (Tool) based on Machine Learning [MIDT-SVM]
    R Rawat, M Chouhan, B Garg, S TELANG, V Mahor, K Pachlasiya
    Available at SSRN 3915404 2021
    Citations: 2

  • Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb (August 12, 2021)
    R Rawat, V Mahor, A Kumar, S Telang, K Pachlasiya, B Garg, M Chouhan
    AIBM-2nd International Conference on “Methods and Applications of Artificial 2021
    Citations: 2

  • Pachlasiya, & Chouhan.(2021)
    G Rawat, T Mahor
    Organ trafficking on the dark web—the data security and privacy concern in
    Citations: 2

  • Mahor.(2021)
    K Rawat, T Chouhan, G Pachlasiya
    Systematic literature review (slr) on social media and the digital
    Citations: 2